5 * Bart De Schuymer <bdschuym@pandora.be>
11 #include <linux/netfilter_bridge/ebtables.h>
12 #include <linux/netfilter_bridge/ebt_log.h>
13 #include <linux/module.h>
15 #include <linux/if_arp.h>
16 #include <linux/spinlock.h>
18 static DEFINE_SPINLOCK(ebt_log_lock
);
20 static int ebt_log_check(const char *tablename
, unsigned int hookmask
,
21 const struct ebt_entry
*e
, void *data
, unsigned int datalen
)
23 struct ebt_log_info
*info
= (struct ebt_log_info
*)data
;
25 if (datalen
!= EBT_ALIGN(sizeof(struct ebt_log_info
)))
27 if (info
->bitmask
& ~EBT_LOG_MASK
)
29 if (info
->loglevel
>= 8)
31 info
->prefix
[EBT_LOG_PREFIX_SIZE
- 1] = '\0';
43 unsigned char mac_src
[ETH_ALEN
];
44 unsigned char ip_src
[4];
45 unsigned char mac_dst
[ETH_ALEN
];
46 unsigned char ip_dst
[4];
49 static void print_MAC(unsigned char *p
)
53 for (i
= 0; i
< ETH_ALEN
; i
++, p
++)
54 printk("%02x%c", *p
, i
== ETH_ALEN
- 1 ? ' ':':');
57 #define myNIPQUAD(a) a[0], a[1], a[2], a[3]
58 static void ebt_log(const struct sk_buff
*skb
, unsigned int hooknr
,
59 const struct net_device
*in
, const struct net_device
*out
,
60 const void *data
, unsigned int datalen
)
62 struct ebt_log_info
*info
= (struct ebt_log_info
*)data
;
63 char level_string
[4] = "< >";
64 union {struct iphdr iph
; struct tcpudphdr ports
;
65 struct arphdr arph
; struct arppayload arpp
;} u
;
67 level_string
[1] = '0' + info
->loglevel
;
68 spin_lock_bh(&ebt_log_lock
);
70 printk("%s IN=%s OUT=%s ", info
->prefix
, in
? in
->name
: "",
71 out
? out
->name
: "");
73 printk("MAC source = ");
74 print_MAC(eth_hdr(skb
)->h_source
);
75 printk("MAC dest = ");
76 print_MAC(eth_hdr(skb
)->h_dest
);
78 printk("proto = 0x%04x", ntohs(eth_hdr(skb
)->h_proto
));
80 if ((info
->bitmask
& EBT_LOG_IP
) && eth_hdr(skb
)->h_proto
==
82 struct iphdr _iph
, *ih
;
84 ih
= skb_header_pointer(skb
, 0, sizeof(_iph
), &_iph
);
86 printk(" INCOMPLETE IP header");
89 printk(" IP SRC=%u.%u.%u.%u IP DST=%u.%u.%u.%u,",
90 NIPQUAD(ih
->saddr
), NIPQUAD(ih
->daddr
));
91 printk(" IP tos=0x%02X, IP proto=%d", u
.iph
.tos
,
93 if (ih
->protocol
== IPPROTO_TCP
||
94 ih
->protocol
== IPPROTO_UDP
) {
95 struct tcpudphdr _ports
, *pptr
;
97 pptr
= skb_header_pointer(skb
, ih
->ihl
*4,
98 sizeof(_ports
), &_ports
);
100 printk(" INCOMPLETE TCP/UDP header");
103 printk(" SPT=%u DPT=%u", ntohs(pptr
->src
),
109 if ((info
->bitmask
& EBT_LOG_ARP
) &&
110 ((eth_hdr(skb
)->h_proto
== htons(ETH_P_ARP
)) ||
111 (eth_hdr(skb
)->h_proto
== htons(ETH_P_RARP
)))) {
112 struct arphdr _arph
, *ah
;
114 ah
= skb_header_pointer(skb
, 0, sizeof(_arph
), &_arph
);
116 printk(" INCOMPLETE ARP header");
119 printk(" ARP HTYPE=%d, PTYPE=0x%04x, OPCODE=%d",
120 ntohs(ah
->ar_hrd
), ntohs(ah
->ar_pro
),
123 /* If it's for Ethernet and the lengths are OK,
124 * then log the ARP payload */
125 if (ah
->ar_hrd
== htons(1) &&
126 ah
->ar_hln
== ETH_ALEN
&&
127 ah
->ar_pln
== sizeof(uint32_t)) {
128 struct arppayload _arpp
, *ap
;
130 ap
= skb_header_pointer(skb
, sizeof(u
.arph
),
131 sizeof(_arpp
), &_arpp
);
133 printk(" INCOMPLETE ARP payload");
136 printk(" ARP MAC SRC=");
137 print_MAC(ap
->mac_src
);
138 printk(" ARP IP SRC=%u.%u.%u.%u",
139 myNIPQUAD(ap
->ip_src
));
140 printk(" ARP MAC DST=");
141 print_MAC(ap
->mac_dst
);
142 printk(" ARP IP DST=%u.%u.%u.%u",
143 myNIPQUAD(ap
->ip_dst
));
148 spin_unlock_bh(&ebt_log_lock
);
151 static struct ebt_watcher log
=
153 .name
= EBT_LOG_WATCHER
,
155 .check
= ebt_log_check
,
159 static int __init
init(void)
161 return ebt_register_watcher(&log
);
164 static void __exit
fini(void)
166 ebt_unregister_watcher(&log
);
171 MODULE_LICENSE("GPL");